The number of cyberattacks targeting students is increasing. How can they prepare themselves?

Reading Time: 4 minutes

The number of cyberattacks targeting educational institutions in the United States has increased by 50%. What are the institutions and students doing to protect themselves?

The number of cyberattacks targeting students is increasing. How can they prepare themselves?
The number of cyberattacks targeting educational institutions in the United States has increased by 50%. Photo: Bigstock
Reading time 4 minutes
Reading Time: 4 minutes

<div class="
image-inset" data-animation-role="image" data-description="

Students reading in different formats to improve comprehension

” data-animation-override=””>

Although new generations, the so-called “digital natives,” spend much of their day on social media and using technology, most young people are unaware of the risks that go with sharing and posting information (photos, videos, texts) online or the consequences of using free online services and Wi-Fi networks.

A survey conducted by McAfee, a computer security software company, taken by 1000 college students and graduates ages 18 to 25, revealed how unconcerned and uninformed young people are about security and online data protection. Even though they are very trusting, 80% of respondents have been victimized or know someone who has been affected by a cyberattack. However, about half of the respondents who still have not been affected by a cyberattack (43%) state that it will not happen to them.

How do young people protect themselves from a possible cyberattack? 53% of respondents said that they have some security software installed on their computers, 37% protect their phones using a Virtual Private Network (VPN), and only 14% have security software installed on their tablets. Surprisingly, only 19% of students take additional steps to protect their school information and projects, while 69% of the students proactively protect their banking or financial information.

What comprises a cyberattack?

A cyberattack or computer attack occurs when there is an attempt to damage, destroy, erase, or attempt to access private or confidential information, databases, or computers, whether personal or business. There are many types of cyberattacks, but the most common are those where the attacker steals a person’s digital identity to perform bank fraud, extort victims, or steal information for malicious purposes. There is also hacktivism, which refers to social protest and political attacks that make the pages of companies, governments, or businesses vulnerable to organizations that target them; the best-known example of these cyber attackers is the Anonymous organization. Additionally, cyber espionage is a practice through which one seeks to obtain sensitive and valuable information to sell it later in the black market. Finally, there is cyberterrorism, which is directed against governments or countries and affects services such as health or defense.

As incredible as it may seem, many cybercriminals seek to attack the youngest, from preschoolers to high school students. Why are younger people attractive targets for cybercriminals? Because their data is “clean,” it is easier to exploit and steal their identity. Sometimes, several years pass before anyone realizes there is a problem. In some cases, criminals come close to paying 350 dollars for student data on the black market.

Schools invest heavily in the physical security of their students, but what about cybersecurity? According to the company McAfee, only 36% of students reported having been informed or having taken a course about cybersecurity at university, which demonstrates that educational institutions should make more effort to offer information and train students about online data protection. The International Society for Technology in Education (ISTE) provides a guide for digital citizens where students can learn the rights and responsibilities of having a digital identity through ISTE Standards for Students. Google has created Interland, a game that teaches children about cybersecurity. In addition to these tools, below, we give some advice for preventing cyber-attacks.

Tips for guarding against cyberattacks

  • Passwords: Creating a complicated password is an easy way to protect yourself. A safe password should include at least eight characters, numbers, uppercase and lowercase letters, and symbols in unconventional places. Most of the time, web pages have a password checker that indicates how complex and hard to guess it is. Another tip is not to include personal information in the password (such as birthdays) and not to use the same password for all accounts because it would be easier to hack. There are also password managers that help with not having to memorize all the passwords for different accounts and sites.

  • Using a Virtual Private Network (VPN): it is normal for students to use public networks to stay connected, but public networks are vulnerable and can store personal information about users. Few young people use a VPN to connect to the internet. This technology serves as a filter that prevents third parties from accessing user data because it encrypts it and prevents it from being intercepted. In the survey, McAfee found that 90% of respondents access public networks, but only 18% are protected with a VPN.

  • Pay attention to your social media profiles: it is advisable not to post photos and videos openly on social networks but to share them only with friends and family. Every time someone posts something online, they leave a digital footprint that, in the future, can serve potential employers or admissions staff to decide whether to hire or admit them as a candidate. It is also advisable that everyone reviews the privacy and security settings of all their social networks on which they have a profile to see which ones are best suited to their uses of that network.

  • Beware of online questionnaires: Online questionnaires are an easy way to obtain personal data. Attractive online tests such as “What type of friend are you?” or a large number of personality tests can reveal sensitive topics like political opinions, sexual orientation, or health and valuable information that is used by companies to sell their products. The most notable dangerous cases of these questionnaires are those of Cambridge Analytica and Facebook.

  • Digital storage in the cloud: Many believe that by having our information stored “in the cloud,” it is protected. But digital storage services like Google Drive, Dropbox, or Apple are also susceptible to cyberattacks, so it is necessary to configure an additional layer of security to access stored files; two-factor authentication is one way.

Lastly, it is crucial to teach students to discuss cybersecurity issues with their peers, friends, and family to raise awareness about the importance of this topic as well as to identify different ways in which criminals steal identities (also known as phishing). It is essential to know what to do if you are a victim of online extortion or a data breach and what protective measures others ha
ve used or recommended to keep themselves safe.

Does your school or institution have a cybersecurity information program? What steps have you taken to protect your online data? Share your experience and recommendations.

Paulette Delgado

This article from Observatory of the Institute for the Future of Education may be shared under the terms of the license CC BY-NC-SA 4.0